Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Intent-Driven Insider Threat Detection in Intelligence Analyses
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
X as a Service, Cloud Computing, and the Need for Good Judgment
IT Professional
Secure Data Objects Replication in Data Grid
IEEE Transactions on Dependable and Secure Computing
Large-scale incremental processing using distributed transactions and notifications
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems
Security issues in querying encrypted data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Security Issues for Cloud Computing
International Journal of Information Security and Privacy
Future Generation Computer Systems
Learning management systems and cloud file hosting services: A study on students' acceptance
Computers in Human Behavior
Hi-index | 0.00 |
Globalization has resulted in outsourcing data, software, hardware and various services. However, outsourcing introduces new security vulnerabilities due to the corporation's limited knowledge and control of external providers operating in foreign countries. Security of operation is therefore critical for effectively introducing and maintaining these business relationships without sacrificing product quality. This paper discusses some of these security concerns for outsourcing. In particular, it discusses security issues pertaining to data-as-a-service and software-as-a-service models as well as supply chain security issues. Relevant standards for data outsourcing are also presented. The goal is for the composite system to be secure even if the individual components that are developed by multiple organizations might be compromised.